Sciweavers

197 search results - page 28 / 40
» A Survey of Trust in Internet Applications
Sort
View
INFOCOM
2012
IEEE
11 years 10 months ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
COMCOM
2000
126views more  COMCOM 2000»
13 years 7 months ago
Charging for packet-switched network communication - motivation and overview
Packet-switched network technology is expected to form the integration layer for future multi-service networks. The trend to integrate voice and data traffic can already be observe...
Martin Karsten, Jens Schmitt, Burkhard Stiller, La...
CN
2002
109views more  CN 2002»
13 years 7 months ago
A network infrastructure for IP mobility support in metropolitan areas
The original design of the Internet and its underlying protocols did not anticipate users to be mobile. With the growing interest in supporting mobile users and mobile computing, ...
Cristina Hristea, Fouad A. Tobagi
AH
2004
Springer
14 years 28 days ago
Recent Soft Computing Approaches to User Modeling in Adaptive Hypermedia
Abstract. The ability of an adaptive hypermedia system to create tailored environments depends mainly on the amount and accuracy of information stored in each user model. One of th...
Enrique Frías-Martínez, George D. Ma...
ACSAC
2001
IEEE
13 years 11 months ago
Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared Care
Shared Care is the common answer to the challenge for improving health system's quality and efficiency. This development must be accompanied by implementing shared care infor...
Bernd Blobel